General

  • Target

    OfficeDocument.exe

  • Size

    279KB

  • Sample

    210304-dvs4y84q2a

  • MD5

    b04e5c4ad1bc75a4a0cd5686e869acdb

  • SHA1

    8a8fadeb752362fb265baa83f690bc4250556d33

  • SHA256

    0e735a5773b8aa36e2a596ea6e468d75038db7dd644236b4eb745b66762f4ebf

  • SHA512

    c06212a009af916a8dd707eca6d1e24cf28ce6b8726b51663562cbf1598138aef5d02b13c3ba2ad5c56940ddb47558224d6d7aa752347e0321267791e7141cfa

Score
10/10

Malware Config

Extracted

Family

buer

C2

grandbanking-api.com

Targets

    • Target

      OfficeDocument.exe

    • Size

      279KB

    • MD5

      b04e5c4ad1bc75a4a0cd5686e869acdb

    • SHA1

      8a8fadeb752362fb265baa83f690bc4250556d33

    • SHA256

      0e735a5773b8aa36e2a596ea6e468d75038db7dd644236b4eb745b66762f4ebf

    • SHA512

      c06212a009af916a8dd707eca6d1e24cf28ce6b8726b51663562cbf1598138aef5d02b13c3ba2ad5c56940ddb47558224d6d7aa752347e0321267791e7141cfa

    Score
    10/10
    • Buer

      Buer is a new modular loader first seen in August 2019.

    • Buer Loader

      Detects Buer loader in memory or disk.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks